2012 International Conference on Communication, Information &Amp; Computing Technology (ICCICT) 2012
DOI: 10.1109/iccict.2012.6398090
|View full text |Cite
|
Sign up to set email alerts
|

Extended visual cryptography for color images using coding tables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…4. As previously mentioned, the main advantage for this technique is increased security as compared to traditional VC through the construction of meaningful shares [49,67,91,105]. EVC is useful for applications such as copyright protection because the same watermark can be embedded in each meaningful share and recovered when combined with a master share [52].…”
Section: Type Of Sharesmentioning
confidence: 99%
See 1 more Smart Citation
“…4. As previously mentioned, the main advantage for this technique is increased security as compared to traditional VC through the construction of meaningful shares [49,67,91,105]. EVC is useful for applications such as copyright protection because the same watermark can be embedded in each meaningful share and recovered when combined with a master share [52].…”
Section: Type Of Sharesmentioning
confidence: 99%
“…Depending on the application, a higher number of shares can either be an advantage or disadvantage. For example, the scheme in [79] only has 2 shares, which is good for storage capacity (reduced memory requirement) as compared to the scheme in [49] which has 4 shares. However, having more shares leads to more flexibility as more parties can hold on to the shares.…”
Section: Comparison Of Visual Cryptography Schemesmentioning
confidence: 99%
“…Further Extended visual cryptography for color images using coding tables by Meera Kamath and Arpita Parab [3] proposed scheme make use of Jarvis error filter, a key table and specialized tables for coding. It works on the same principle as Adi and Shamir's cryptography.…”
Section: Literature Surveymentioning
confidence: 99%
“…Thus motivated, the secret-sharing method will be the better technique that not only increases the security but also has an extremely high opportunity of recovering the secret information completely. Visual cryptography is a sensible choice for conserving the privacy of a color covert image [2]. It is an evolving cryptography technology that uses human vision for decryption.…”
Section: Introductionmentioning
confidence: 99%